Lucene search

K

packeteer-xss.txt

🗓️ 25 Feb 2008 00:00:00Reported by nnposterType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 20 Views

Packeteer Products File Listing XSS vulnerability in web management interfac

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`Packeteer Products File Listing XSS  
  
  
Product:  
  
Packeteer PacketShaper  
http://www.packeteer.com/products/packetshaper/  
  
Packeteer PolicyCenter  
http://www.packeteer.com/products/packetshaper/policycenter.cfm  
  
  
The web management interface of several Packeteer products contains a cross-site scripting vulnerability in the file listing function. Parameter FILELIST, specified in an arbitrary page request, is not sufficiently sanitized before it gets embedded in the HTML output of the Error Report page. (The parameter value is limited to 64 characters.)  
  
Example:  
https://(target)/whatever.htm?FILELIST=%3C/script%3E%3Cbody+onLoad=alert(%26quot%3BXSS%26quot%3B)%3E%3Cscript%3E  
  
  
The vulnerability has been identified in version 8.2.2. However, other versions may be also affected.  
  
  
Solution:  
Do not stay logged into the Packeteer web management interface while browsing other web sites.  
  
  
Found by:  
nnposter  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo